Description
In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: strictly check for maximum number of actions

The maximum number of flowtable hardware offload actions in IPv6 is:

* ethernet mangling (4 payload actions, 2 for each ethernet address)
* SNAT (4 payload actions)
* DNAT (4 payload actions)
* Double VLAN (4 vlan actions, 2 for popping vlan, and 2 for pushing)
for QinQ.
* Redirect (1 action)

Which makes 17, while the maximum is 16. But act_ct supports for tunnels
actions too. Note that payload action operates at 32-bit word level, so
mangling an IPv6 address takes 4 payload actions.

Update flow_action_entry_next() calls to check for the maximum number of
supported actions.

While at it, rise the maximum number of actions per flow from 16 to 24
so this works fine with IPv6 setups.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability stems from the Linux kernel’s netfilter flowtable code not enforcing the correct maximum number of hardware offload actions for IPv6 packets. While the taxonomy limits the table to sixteen actions, legitimate IPv6 configurations can require seventeen or more – for example, ethernet address mangling, SNAT, DNAT, double VLANs, and redirects each consume multiple payload actions. The unchecked count allows a kernel buffer overrun, which can corrupt kernel memory or trigger a panic. Because this occurs in privileged kernel space, an attacker could cause a denial‑of‑service or, if an additional step is leveraged, potentially execute code with root privileges.

Affected Systems

All Linux systems running a kernel that implements netfilter’s flowtable offload for IPv6 traffic and has not yet integrated the fix that raises the limit to twenty‑four actions. The vendor indicated is "Linux:Linux", representing the Linux kernel itself; thus any distribution that includes the affected kernel version, regardless of distro name, is susceptible.

Risk and Exploitability

No CVSS rating is present, and the Exploit Prediction Scoring System (EPSS) score is unavailable, indicating no broad public exploitation data. The vulnerability is not listed in CISA KEV, suggesting it has not been observed in the wild. However, exploitation would likely require an attacker to craft network packets that deliver an oversized flowtable action list to the target. This is a network‑based attack vector. Given the kernel privilege context, the potential impact is large, so remaining unpatched systems could be at risk of a denial‑of‑service or, with further vulnerability exploitation, a privilege escalation.

Generated by OpenCVE AI on May 8, 2026 at 19:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version containing the netfilter flowtable action‑limit patch, which raises the maximum to twenty‑four actions.
  • If a kernel upgrade cannot be applied immediately, disable flowtable hardware offload for IPv6 traffic by adjusting netfilter settings (e.g., clearing the relevant sysctl entries) or by applying configuration rules that exhaust the available action set before the offload path is used.
  • Monitor network traffic for anomalous packets that trigger unexpected large action lists, and enforce strict filtering on interfaces that may be exposed to untrusted traffic.

Generated by OpenCVE AI on May 8, 2026 at 19:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119
CWE-680

Fri, 08 May 2026 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netfilter: flowtable: strictly check for maximum number of actions The maximum number of flowtable hardware offload actions in IPv6 is: * ethernet mangling (4 payload actions, 2 for each ethernet address) * SNAT (4 payload actions) * DNAT (4 payload actions) * Double VLAN (4 vlan actions, 2 for popping vlan, and 2 for pushing) for QinQ. * Redirect (1 action) Which makes 17, while the maximum is 16. But act_ct supports for tunnels actions too. Note that payload action operates at 32-bit word level, so mangling an IPv6 address takes 4 payload actions. Update flow_action_entry_next() calls to check for the maximum number of supported actions. While at it, rise the maximum number of actions per flow from 16 to 24 so this works fine with IPv6 setups.
Title netfilter: flowtable: strictly check for maximum number of actions
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:31:17.479Z

Reserved: 2026-05-01T14:12:56.002Z

Link: CVE-2026-43329

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:42.520

Modified: 2026-05-08T14:16:42.520

Link: CVE-2026-43329

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T23:45:20Z

Weaknesses